Jump to ContentJump to Main Navigation
Cyber Operations and the Use of Force in International Law$
Users without a subscription are not able to see the full content.

Marco Roscini

Print publication date: 2014

Print ISBN-13: 9780199655014

Published to Oxford Scholarship Online: April 2014

DOI: 10.1093/acprof:oso/9780199655014.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (www.oxfordscholarship.com). (c) Copyright Oxford University Press, 2020. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in OSO for personal use. date: 29 March 2020

Cyber Operations and the Law of Neutrality

Cyber Operations and the Law of Neutrality

Chapter:
(p.246) 5 Cyber Operations and the Law of Neutrality
Source:
Cyber Operations and the Use of Force in International Law
Author(s):

Marco Roscini

Publisher:
Oxford University Press
DOI:10.1093/acprof:oso/9780199655014.003.0005

This Chapter explores how the law of neutrality affects the conduct of cyber operations by neutral and belligerent states. It first establishes in what situations the law of neutrality applies and subsequently explores what cyber activities carried out by the belligerent and neutral states may breach their obligations under the law of neutrality by distinguishing operations from, through, and with effects on neutral territory, as well as other cyber and cyber-related activities, including the use of cyber infrastructures on neutral territory for communication purposes. The impact of the entry into force of the UN Charter on the law of neutrality is then discussed, while the last section looks at the remedies against cyber activities that breach the law of neutrality, in particular the resort to forcible and non-forcible countermeasures against such violations.

Keywords:   neutrality, UN Charter, jus in bello, non-belligerency, international armed conflict, communications, countermeasure

Oxford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .